100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Summary

Summary Wk 5 - Apply: Summative Assessment: Backup PoliciesUniversity of Phoenix CYB/110A Trojan i

Rating
-
Sold
-
Pages
13
Uploaded on
01-12-2024
Written in
2024/2025

Wk 5 - Apply: Summative Assessment: Backup PoliciesUniversity of Phoenix CYB/110A Trojan is malware that disguises itself as a legitimate application. A Trojan horse payload is typically a backdoor that allows attackers to gain access to the infected computer. Trojans also give cybercriminals access to sensitive, confidential information of a user, such as IP addresses, passwords, and banking details. Oftentimes, Trojans are delivered via email attachments, drive- by downloads, and/or posing as a legitimate application with hidden, malicious code embedded. Once executed, Trojans deliver their payload and find ways to spread.Preparationï‚· Decide who should be members of the Cybersecurity Incident Response Team (CSIRT).o Vulnerability Manager, Threat Manager, Risk Manager.o CSIRT core members should be comprised of cybersecurity personnel.o Assign roles and responsibilities to every me

Show more Read less
Institution
Wgu
Course
C204









Whoops! We can’t load your doc right now. Try again or contact support.

Document information

Uploaded on
December 1, 2024
Number of pages
13
Written in
2024/2025
Type
Summary

Subjects

Content preview

Wk 5 - Apply: Summative Assessment: Backup Policies

University of Phoenix

CYB/110

A Trojan is malware that disguises itself as a legitimate application. A Trojan horse payload is
typically a backdoor that allows attackers to gain access to the infected computer. Trojans also
give cybercriminals access to sensitive, confidential information of a user, such as IP addresses,
passwords, and banking details. Oftentimes, Trojans are delivered via email attachments, drive-
by downloads, and/or posing as a legitimate application with hidden, malicious code embedded.
Once executed, Trojans deliver their payload and find ways to spread.


Preparation

 Decide who should be members of the Cybersecurity Incident Response Team (CSIRT).
o Vulnerability Manager, Threat Manager, Risk Manager.
o CSIRT core members should be comprised of cybersecurity personnel.
o Assign roles and responsibilities to every member.
 Determine Extended CSIRT Team members and Define Roles.
o Executive Lead, Professional Services Lead, Response Support (Legal, Public
Relations, Compliance, etc.).
 Define escalation paths.
o Incidents may start as lower impact/severity ratings and then increase as more
information is gathered. Establishing an escalation path is critical.
 Evaluate and secure critical system backups.
o Backups should be created, maintained, and secured before any incidents occur.
o During the initial stages of any incident, verify that backups are secure and not
impacted by the incident.

Detection
 Define Threat Indicators
o Unknown or unexpected services and applications configured to launch
automatically upon system boot.

, o Unknown or unexpected outgoing internet traffic.
o Anti-virus programs malfunctioning or becoming disabled for unknown reasons.
o Degraded processing capability (increased CPU utilization).
 Isolate infected systems ASAP.
o DO NOT power off machines, as forensic artifacts could be lost.
o Preserve the system(s) for further forensic investigation, reviewing system logs
and performing deep scans for malware.
 These steps should be performed to guide the investigation.
 Investigate malware to see if it is running with a user accounts credentials.
o If so, disable the user account(s) until the investigation is complete.
 Analyze the malware to determine how to contain the outbreak.
o If available, use a sandboxed malware analysis system to perform analysis.

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
newage Uop
View profile
Follow You need to be logged in order to follow users or courses
Sold
22
Member since
3 year
Number of followers
15
Documents
4723
Last sold
6 months ago
A+ Self prepared Study guides for my peers

Truly helpful study guides

4.2

6 reviews

5
3
4
1
3
2
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions